blob: 1805413cd225117466fff8907ee506d92a9f22a2 [file] [log] [blame]
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 * xfrm4_policy.c
3 *
4 * Changes:
5 * Kazunori MIYAZAWA @USAGI
6 * YOSHIFUJI Hideaki @USAGI
7 * Split up af-specific portion
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09008 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
Herbert Xu66cdb3c2007-11-13 21:37:28 -080011#include <linux/err.h>
12#include <linux/kernel.h>
Herbert Xuaabc9762005-05-03 16:27:10 -070013#include <linux/inetdevice.h>
Timo Teräscc9ff192010-11-03 04:41:38 +000014#include <linux/if_tunnel.h>
Herbert Xu45ff5a32007-11-13 21:35:32 -080015#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <net/xfrm.h>
17#include <net/ip.h>
David Ahern385add92015-09-29 20:07:13 -070018#include <net/l3mdev.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
Linus Torvalds1da177e2005-04-16 15:20:36 -070020static struct xfrm_policy_afinfo xfrm4_policy_afinfo;
21
David S. Miller8f01cb02011-05-09 15:13:28 -070022static struct dst_entry *__xfrm4_dst_lookup(struct net *net, struct flowi4 *fl4,
David Ahern42a7b322015-08-10 16:58:11 -060023 int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070024 const xfrm_address_t *saddr,
25 const xfrm_address_t *daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -070026{
Herbert Xu66cdb3c2007-11-13 21:37:28 -080027 struct rtable *rt;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070028
David S. Miller8f01cb02011-05-09 15:13:28 -070029 memset(fl4, 0, sizeof(*fl4));
30 fl4->daddr = daddr->a4;
31 fl4->flowi4_tos = tos;
David Ahern11d7a0b2016-08-14 19:52:56 -070032 fl4->flowi4_oif = l3mdev_master_ifindex_by_index(net, oif);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080033 if (saddr)
David S. Miller8f01cb02011-05-09 15:13:28 -070034 fl4->saddr = saddr->a4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080035
David Ahern58189ca2015-09-15 15:10:50 -070036 fl4->flowi4_flags = FLOWI_FLAG_SKIP_NH_OIF;
37
David S. Miller8f01cb02011-05-09 15:13:28 -070038 rt = __ip_route_output_key(net, fl4);
David S. Millerb23dd4f2011-03-02 14:31:35 -080039 if (!IS_ERR(rt))
40 return &rt->dst;
41
42 return ERR_CAST(rt);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080043}
44
David Ahern42a7b322015-08-10 16:58:11 -060045static struct dst_entry *xfrm4_dst_lookup(struct net *net, int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070046 const xfrm_address_t *saddr,
47 const xfrm_address_t *daddr)
48{
49 struct flowi4 fl4;
50
David Ahern42a7b322015-08-10 16:58:11 -060051 return __xfrm4_dst_lookup(net, &fl4, tos, oif, saddr, daddr);
David S. Miller8f01cb02011-05-09 15:13:28 -070052}
53
David Ahern42a7b322015-08-10 16:58:11 -060054static int xfrm4_get_saddr(struct net *net, int oif,
Alexey Dobriyanfbda33b2008-11-25 17:56:49 -080055 xfrm_address_t *saddr, xfrm_address_t *daddr)
Herbert Xu66cdb3c2007-11-13 21:37:28 -080056{
57 struct dst_entry *dst;
David S. Miller8f01cb02011-05-09 15:13:28 -070058 struct flowi4 fl4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080059
David Ahern42a7b322015-08-10 16:58:11 -060060 dst = __xfrm4_dst_lookup(net, &fl4, 0, oif, NULL, daddr);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080061 if (IS_ERR(dst))
62 return -EHOSTUNREACH;
63
David S. Miller8f01cb02011-05-09 15:13:28 -070064 saddr->a4 = fl4.saddr;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080065 dst_release(dst);
66 return 0;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070067}
68
David S. Miller05d84022011-02-22 17:47:10 -080069static int xfrm4_get_tos(const struct flowi *fl)
Linus Torvalds1da177e2005-04-16 15:20:36 -070070{
David S. Miller7e1dc7b2011-03-12 02:42:11 -050071 return IPTOS_RT_MASK & fl->u.ip4.flowi4_tos; /* Strip ECN bits */
Herbert Xu25ee3282007-12-11 09:32:34 -080072}
Linus Torvalds1da177e2005-04-16 15:20:36 -070073
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -080074static int xfrm4_init_path(struct xfrm_dst *path, struct dst_entry *dst,
75 int nfheader_len)
76{
77 return 0;
78}
79
Herbert Xu87c1e122010-03-02 02:51:56 +000080static int xfrm4_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
David S. Miller0c7b3ee2011-02-22 17:48:57 -080081 const struct flowi *fl)
Herbert Xu25ee3282007-12-11 09:32:34 -080082{
83 struct rtable *rt = (struct rtable *)xdst->route;
David S. Miller7e1dc7b2011-03-12 02:42:11 -050084 const struct flowi4 *fl4 = &fl->u.ip4;
Linus Torvalds1da177e2005-04-16 15:20:36 -070085
Yan, Zhengb7323392011-10-22 21:58:20 +000086 xdst->u.rt.rt_iif = fl4->flowi4_iif;
Linus Torvalds1da177e2005-04-16 15:20:36 -070087
Herbert Xu25ee3282007-12-11 09:32:34 -080088 xdst->u.dst.dev = dev;
89 dev_hold(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -070090
Herbert Xu25ee3282007-12-11 09:32:34 -080091 /* Sheit... I remember I did this right. Apparently,
92 * it was magically lost, so this code needs audit */
David S. Miller9917e1e82012-07-17 14:44:26 -070093 xdst->u.rt.rt_is_input = rt->rt_is_input;
Herbert Xu25ee3282007-12-11 09:32:34 -080094 xdst->u.rt.rt_flags = rt->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST |
95 RTCF_LOCAL);
96 xdst->u.rt.rt_type = rt->rt_type;
Herbert Xu25ee3282007-12-11 09:32:34 -080097 xdst->u.rt.rt_gateway = rt->rt_gateway;
Julian Anastasov155e8332012-10-08 11:41:18 +000098 xdst->u.rt.rt_uses_gateway = rt->rt_uses_gateway;
David S. Miller59436342012-07-10 06:58:42 -070099 xdst->u.rt.rt_pmtu = rt->rt_pmtu;
Sabrina Dubrocad5439072018-03-14 10:21:14 +0100100 xdst->u.rt.rt_mtu_locked = rt->rt_mtu_locked;
David Ahernb7503e02015-09-02 13:58:35 -0700101 xdst->u.rt.rt_table_id = rt->rt_table_id;
David S. Millercaacf052012-07-31 15:06:50 -0700102 INIT_LIST_HEAD(&xdst->u.rt.rt_uncached);
Miika Komu43372262007-02-06 14:27:32 -0800103
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105}
106
107static void
Herbert Xud5422ef2007-12-12 10:44:16 -0800108_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000110 const struct iphdr *iph = ip_hdr(skb);
Steffen Klassert5b28db52019-02-26 07:04:50 +0100111 int ihl = iph->ihl;
112 u8 *xprth = skb_network_header(skb) + ihl * 4;
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500113 struct flowi4 *fl4 = &fl->u.ip4;
Steffen Klassert84502b52013-10-30 11:16:28 +0100114 int oif = 0;
115
David Ahern385add92015-09-29 20:07:13 -0700116 if (skb_dst(skb))
David Aherne0d56fd2016-09-10 12:09:57 -0700117 oif = skb_dst(skb)->dev->ifindex;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500119 memset(fl4, 0, sizeof(struct flowi4));
120 fl4->flowi4_mark = skb->mark;
Steffen Klassert84502b52013-10-30 11:16:28 +0100121 fl4->flowi4_oif = reverse ? skb->skb_iif : oif;
Peter Kosyh44b451f2010-07-02 07:47:55 +0000122
Steffen Klassert5b28db52019-02-26 07:04:50 +0100123 fl4->flowi4_proto = iph->protocol;
124 fl4->daddr = reverse ? iph->saddr : iph->daddr;
125 fl4->saddr = reverse ? iph->daddr : iph->saddr;
126 fl4->flowi4_tos = iph->tos;
127
Paul Gortmaker56f8a752011-06-21 20:33:34 -0700128 if (!ip_is_fragment(iph)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700129 switch (iph->protocol) {
130 case IPPROTO_UDP:
Gerrit Renkerba4e58e2006-11-27 11:10:57 -0800131 case IPPROTO_UDPLITE:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700132 case IPPROTO_TCP:
133 case IPPROTO_SCTP:
Patrick McHardy9e999992005-12-19 14:03:46 -0800134 case IPPROTO_DCCP:
Wei Yongjunc615c9f2009-07-02 16:57:23 +0000135 if (xprth + 4 < skb->data ||
136 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200137 __be16 *ports;
138
Steffen Klassert5b28db52019-02-26 07:04:50 +0100139 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200140 ports = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700141
David S. Miller9cce96d2011-03-12 03:00:33 -0500142 fl4->fl4_sport = ports[!!reverse];
143 fl4->fl4_dport = ports[!reverse];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700144 }
145 break;
146
147 case IPPROTO_ICMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200148 if (xprth + 2 < skb->data ||
149 pskb_may_pull(skb, xprth + 2 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200150 u8 *icmp;
151
Steffen Klassert5b28db52019-02-26 07:04:50 +0100152 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200153 icmp = xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154
David S. Miller9cce96d2011-03-12 03:00:33 -0500155 fl4->fl4_icmp_type = icmp[0];
156 fl4->fl4_icmp_code = icmp[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700157 }
158 break;
159
160 case IPPROTO_ESP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200161 if (xprth + 4 < skb->data ||
162 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200163 __be32 *ehdr;
164
Steffen Klassert5b28db52019-02-26 07:04:50 +0100165 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200166 ehdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700167
David S. Miller9cce96d2011-03-12 03:00:33 -0500168 fl4->fl4_ipsec_spi = ehdr[0];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700169 }
170 break;
171
172 case IPPROTO_AH:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200173 if (xprth + 8 < skb->data ||
174 pskb_may_pull(skb, xprth + 8 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200175 __be32 *ah_hdr;
176
Steffen Klassert5b28db52019-02-26 07:04:50 +0100177 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200178 ah_hdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700179
David S. Miller9cce96d2011-03-12 03:00:33 -0500180 fl4->fl4_ipsec_spi = ah_hdr[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700181 }
182 break;
183
184 case IPPROTO_COMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200185 if (xprth + 4 < skb->data ||
186 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200187 __be16 *ipcomp_hdr;
188
Steffen Klassert5b28db52019-02-26 07:04:50 +0100189 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200190 ipcomp_hdr = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700191
David S. Miller9cce96d2011-03-12 03:00:33 -0500192 fl4->fl4_ipsec_spi = htonl(ntohs(ipcomp_hdr[1]));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700193 }
194 break;
Timo Teräscc9ff192010-11-03 04:41:38 +0000195
196 case IPPROTO_GRE:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200197 if (xprth + 12 < skb->data ||
198 pskb_may_pull(skb, xprth + 12 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200199 __be16 *greflags;
200 __be32 *gre_hdr;
201
Steffen Klassert5b28db52019-02-26 07:04:50 +0100202 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200203 greflags = (__be16 *)xprth;
204 gre_hdr = (__be32 *)xprth;
Timo Teräscc9ff192010-11-03 04:41:38 +0000205
206 if (greflags[0] & GRE_KEY) {
207 if (greflags[0] & GRE_CSUM)
208 gre_hdr++;
David S. Miller9cce96d2011-03-12 03:00:33 -0500209 fl4->fl4_gre_key = gre_hdr[1];
Timo Teräscc9ff192010-11-03 04:41:38 +0000210 }
211 }
212 break;
213
Linus Torvalds1da177e2005-04-16 15:20:36 -0700214 default:
David S. Miller9cce96d2011-03-12 03:00:33 -0500215 fl4->fl4_ipsec_spi = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700216 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700217 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700219}
220
Daniel Lezcano569d3642008-01-18 03:56:57 -0800221static inline int xfrm4_garbage_collect(struct dst_ops *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700222{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800223 struct net *net = container_of(ops, struct net, xfrm.xfrm4_dst_ops);
224
225 xfrm4_policy_afinfo.garbage_collect(net);
Eric Dumazetfc66f952010-10-08 06:37:34 +0000226 return (dst_entries_get_slow(ops) > ops->gc_thresh * 2);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227}
228
David S. Miller6700c272012-07-17 03:29:28 -0700229static void xfrm4_update_pmtu(struct dst_entry *dst, struct sock *sk,
230 struct sk_buff *skb, u32 mtu)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700231{
232 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
233 struct dst_entry *path = xdst->route;
234
David S. Miller6700c272012-07-17 03:29:28 -0700235 path->ops->update_pmtu(path, sk, skb, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700236}
237
David S. Miller6700c272012-07-17 03:29:28 -0700238static void xfrm4_redirect(struct dst_entry *dst, struct sock *sk,
239 struct sk_buff *skb)
David S. Miller55be7a92012-07-11 21:27:49 -0700240{
241 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
242 struct dst_entry *path = xdst->route;
243
David S. Miller6700c272012-07-17 03:29:28 -0700244 path->ops->redirect(path, sk, skb);
David S. Miller55be7a92012-07-11 21:27:49 -0700245}
246
Herbert Xuaabc9762005-05-03 16:27:10 -0700247static void xfrm4_dst_destroy(struct dst_entry *dst)
248{
249 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
250
David S. Miller62fa8a82011-01-26 20:51:05 -0800251 dst_destroy_metrics_generic(dst);
252
Herbert Xuaabc9762005-05-03 16:27:10 -0700253 xfrm_dst_destroy(xdst);
254}
255
256static void xfrm4_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
257 int unregister)
258{
Herbert Xuaabc9762005-05-03 16:27:10 -0700259 if (!unregister)
260 return;
261
Herbert Xuaabc9762005-05-03 16:27:10 -0700262 xfrm_dst_ifdown(dst, dev);
263}
264
Dan Streetmana8a572a2015-10-29 09:51:16 -0400265static struct dst_ops xfrm4_dst_ops_template = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700266 .family = AF_INET,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700267 .gc = xfrm4_garbage_collect,
268 .update_pmtu = xfrm4_update_pmtu,
David S. Miller55be7a92012-07-11 21:27:49 -0700269 .redirect = xfrm4_redirect,
David S. Miller62fa8a82011-01-26 20:51:05 -0800270 .cow_metrics = dst_cow_metrics_generic,
Herbert Xuaabc9762005-05-03 16:27:10 -0700271 .destroy = xfrm4_dst_destroy,
272 .ifdown = xfrm4_dst_ifdown,
Herbert Xu862b82c2007-11-13 21:43:11 -0800273 .local_out = __ip_local_out,
Steffen Klassertc3865782015-09-29 11:40:49 +0200274 .gc_thresh = INT_MAX,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700275};
276
277static struct xfrm_policy_afinfo xfrm4_policy_afinfo = {
278 .family = AF_INET,
Dan Streetmana8a572a2015-10-29 09:51:16 -0400279 .dst_ops = &xfrm4_dst_ops_template,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700280 .dst_lookup = xfrm4_dst_lookup,
Patrick McHardya1e59ab2006-09-19 12:57:34 -0700281 .get_saddr = xfrm4_get_saddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700282 .decode_session = _decode_session4,
Herbert Xu25ee3282007-12-11 09:32:34 -0800283 .get_tos = xfrm4_get_tos,
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -0800284 .init_path = xfrm4_init_path,
Herbert Xu25ee3282007-12-11 09:32:34 -0800285 .fill_dst = xfrm4_fill_dst,
David S. Miller2774c132011-03-01 14:59:04 -0800286 .blackhole_route = ipv4_blackhole_route,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700287};
288
Randy Dunlapf8167002009-08-04 20:18:33 -0700289#ifdef CONFIG_SYSCTL
Neil Hormana44a4a02009-07-27 08:22:46 +0000290static struct ctl_table xfrm4_policy_table[] = {
291 {
Neil Hormana44a4a02009-07-27 08:22:46 +0000292 .procname = "xfrm4_gc_thresh",
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800293 .data = &init_net.xfrm.xfrm4_dst_ops.gc_thresh,
Neil Hormana44a4a02009-07-27 08:22:46 +0000294 .maxlen = sizeof(int),
295 .mode = 0644,
296 .proc_handler = proc_dointvec,
297 },
298 { }
299};
300
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200301static __net_init int xfrm4_net_sysctl_init(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100302{
303 struct ctl_table *table;
304 struct ctl_table_header *hdr;
305
306 table = xfrm4_policy_table;
307 if (!net_eq(net, &init_net)) {
308 table = kmemdup(table, sizeof(xfrm4_policy_table), GFP_KERNEL);
309 if (!table)
310 goto err_alloc;
311
312 table[0].data = &net->xfrm.xfrm4_dst_ops.gc_thresh;
313 }
314
315 hdr = register_net_sysctl(net, "net/ipv4", table);
316 if (!hdr)
317 goto err_reg;
318
319 net->ipv4.xfrm4_hdr = hdr;
320 return 0;
321
322err_reg:
323 if (!net_eq(net, &init_net))
324 kfree(table);
325err_alloc:
326 return -ENOMEM;
327}
328
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200329static __net_exit void xfrm4_net_sysctl_exit(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100330{
331 struct ctl_table *table;
332
Ian Morris51456b22015-04-03 09:17:26 +0100333 if (!net->ipv4.xfrm4_hdr)
Michal Kubecek8d068872013-02-06 10:46:33 +0100334 return;
335
336 table = net->ipv4.xfrm4_hdr->ctl_table_arg;
337 unregister_net_sysctl_table(net->ipv4.xfrm4_hdr);
338 if (!net_eq(net, &init_net))
339 kfree(table);
340}
Dan Streetmana8a572a2015-10-29 09:51:16 -0400341#else /* CONFIG_SYSCTL */
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200342static inline int xfrm4_net_sysctl_init(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400343{
344 return 0;
345}
346
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200347static inline void xfrm4_net_sysctl_exit(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400348{
349}
350#endif
351
352static int __net_init xfrm4_net_init(struct net *net)
353{
354 int ret;
355
356 memcpy(&net->xfrm.xfrm4_dst_ops, &xfrm4_dst_ops_template,
357 sizeof(xfrm4_dst_ops_template));
358 ret = dst_entries_init(&net->xfrm.xfrm4_dst_ops);
359 if (ret)
360 return ret;
361
362 ret = xfrm4_net_sysctl_init(net);
363 if (ret)
364 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
365
366 return ret;
367}
368
369static void __net_exit xfrm4_net_exit(struct net *net)
370{
371 xfrm4_net_sysctl_exit(net);
372 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
373}
Michal Kubecek8d068872013-02-06 10:46:33 +0100374
375static struct pernet_operations __net_initdata xfrm4_net_ops = {
376 .init = xfrm4_net_init,
377 .exit = xfrm4_net_exit,
378};
Neil Hormana44a4a02009-07-27 08:22:46 +0000379
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380static void __init xfrm4_policy_init(void)
381{
382 xfrm_policy_register_afinfo(&xfrm4_policy_afinfo);
383}
384
Steffen Klassert703fb942012-11-13 08:52:24 +0100385void __init xfrm4_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700386{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800387 xfrm4_state_init();
388 xfrm4_policy_init();
Steffen Klassert2f32b512014-03-14 07:28:07 +0100389 xfrm4_protocol_init();
Michal Kubecek8d068872013-02-06 10:46:33 +0100390 register_pernet_subsys(&xfrm4_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700391}
392